MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ff76c599e55cf1df34e0ccb7e3c30fa26402c11c3a561b3e33e9d0d3f3483beb. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Formbook


Vendor detections: 12


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: ff76c599e55cf1df34e0ccb7e3c30fa26402c11c3a561b3e33e9d0d3f3483beb
SHA3-384 hash: ea9b1e6e6eecf87ba2a3f2c7631a3ef99bf9bfd00b2bea904ab51c95796587e62dba5b29ed23582f67ef52c9089a46b8
SHA1 hash: 7c54bf7fddba72cbae3dc48e7856837330f64c6d
MD5 hash: 41e9ca3b17e5bdb4a415a6fee59de5bc
humanhash: fanta-carpet-west-potato
File name:DocuSign.js
Download: download sample
Signature Formbook
File size:1'145'165 bytes
First seen:2026-01-30 09:47:16 UTC
Last seen:Never
File type:Java Script (JS) js
MIME type:text/plain
ssdeep 768:6Lrtwmj2cbBhhDc5wNBVjFYvM1mdzmlIceCzbVxwzNtxdjT2:4
Threatray 129 similar samples on MalwareBazaar
TLSH T1CF356857E7B408DD4FA1DADCE46072E2C9048E9C749BC6ECDAA069F7F64904D2B18D32
Magika javascript
Reporter JAMESWT_WT
Tags:FormBook js MSI-STEGO26

Intelligence


File Origin
# of uploads :
1
# of downloads :
113
Origin country :
IT IT
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Score:
99.1%
Tags:
obfuscate xtreme virus
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm base64 base64 fingerprint obfuscated obfuscated overlay powershell repaired
Verdict:
Malicious
File Type:
js
First seen:
2026-01-29T04:03:00Z UTC
Last seen:
2026-02-01T07:11:00Z UTC
Hits:
~100
Detections:
Trojan.JS.SAgent.sb HEUR:Trojan.Script.Generic
Gathering data
Threat name:
Script-JS.Backdoor.FormBook
Status:
Malicious
First seen:
2026-01-29 07:33:58 UTC
File Type:
Binary
AV detection:
6 of 24 (25.00%)
Threat level:
  5/5
Result
Malware family:
formbook
Score:
  10/10
Tags:
family:formbook execution rat spyware stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Command and Scripting Interpreter: JavaScript
Suspicious use of SetThreadContext
Badlisted process makes network request
Command and Scripting Interpreter: PowerShell
Formbook payload
Formbook
Formbook family
Process spawned unexpected child process
Malware Config
Dropper Extraction:
https://res.cloudinary.com/dxxyxpqxg/image/upload/v1769187753/optimized_MSI_nthgyz.jpg
Malware family:
DnlibLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments